Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 169 (2.002 secs)
You searched for: subject:"Multi-day-training"
[1] 2 3 4     Next    Last
[movies]Day 1 Part 4: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,295
[movies]Day 1 Part 6: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,320
[movies]Day 1 Part 1: Introduction to Reverse Engineering Software - Matt Briggs
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to unde...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; IDA; IDA Pro; Debugging; Intel x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 2,923
[movies]Day 2 Part 1: Introduction to ARM - Gananand Kini
Class materials at http://www.OpenSecurityTraining.info/IntroARM.html Follow us on Twitter for class news @OpenSecTraining. ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand, optimiz...
Keywords: OpenSecurityTraining.info; ARM; Acorn RISC Machine; Advanced RISC Machine; assembly; disassembly; reverse engineering; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 858
[movies]Day 2 Part 2: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,228
[movies]Day 2 Part 3: Introduction to ARM - Gananand Kini
Class materials at http://www.OpenSecurityTraining.info/IntroARM.html Follow us on Twitter for class news @OpenSecTraining. ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand, optimiz...
Keywords: OpenSecurityTraining.info; ARM; Acorn RISC Machine; Advanced RISC Machine; assembly; disassembly; reverse engineering; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 701
[movies]Day 1 Part 5: Introduction to Reverse Engineering Software - Matt Briggs
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to unde...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; IDA; IDA Pro; Debugging; Intel x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 1,405
[movies]Day 2 Part 4: Introduction to Reverse Engineering Software - Matt Briggs
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to unde...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; IDA; IDA Pro; Debugging; Intel x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 1,400
[movies]Day 1 Part 2: Introduction to Reverse Engineering Software - Matt Briggs
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to unde...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; IDA; IDA Pro; Debugging; Intel x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 1,777
[movies]Day 1 Part 1: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 2,760
[movies]Day 1 Part 5: Introduction to ARM - Gananand Kini
Class materials at http://www.OpenSecurityTraining.info/IntroARM.html Follow us on Twitter for class news @OpenSecTraining. ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand, optimiz...
Keywords: OpenSecurityTraining.info; ARM; Acorn RISC Machine; Advanced RISC Machine; assembly; disassembly; reverse engineering; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 706
[movies]Introductory Intel x86: Architecture, Assembly, Applications, Day 2, Part 3 - Xeno Kovah
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation...
Keywords: Intel; x86; Intel x86; IA32; training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; disassembly; reverse engineering; OpenSecurityTraining.info
Downloads: 3,323
[movies]Day 1 Part 5: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,242
[movies]Day 1 Part 2: Introduction to ARM - Gananand Kini
Class materials at http://www.OpenSecurityTraining.info/IntroARM.html Follow us on Twitter for class news @OpenSecTraining. ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand, optimiz...
Keywords: OpenSecurityTraining.info; ARM; Acorn RISC Machine; Advanced RISC Machine; assembly; disassembly; reverse engineering; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 952
[movies]Introductory Intel x86: Architecture, Assembly, Applications, Day 1, Part 1 - Xeno Kovah
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation...
Keywords: Intel; x86; Intel x86; IA32; training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; disassembly; reverse engineering; OpenSecurityTraining.info
Downloads: 13,039
[movies]Day 2 Part 5: Introduction to Reverse Engineering Software - Matt Briggs
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to unde...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; IDA; IDA Pro; Debugging; Intel x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 1,345
[movies]Exploits 1 Class Labs Linux VM - Corey K.
This is the Ubuntu Linux VM that can be used for doing labs associated with the class here:http://archive.org/details/Day1Part1IntroductionToSoftwareExploitshttp://opensecuritytraining.info/Exploits1.html
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,847
[movies]Day 2 Part 4: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,187
[movies]Day 1 Part 3: Introduction to Reverse Engineering Software - Matt Briggs
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to unde...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; IDA; IDA Pro; Debugging; Intel x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 1,642
[movies]Day 1 Part 4: Introduction to ARM - Gananand Kini
Class materials at http://www.OpenSecurityTraining.info/IntroARM.html Follow us on Twitter for class news @OpenSecTraining. ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand, optimiz...
Keywords: OpenSecurityTraining.info; ARM; Acorn RISC Machine; Advanced RISC Machine; assembly; disassembly; reverse engineering; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 832
[movies]Day 1 Part 4: Introduction to Reverse Engineering Software - Matt Briggs
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to unde...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; IDA; IDA Pro; Debugging; Intel x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 1,575
[movies]Introductory Intel x86: Architecture, Assembly, Applications, Day 2, Part 6 - Xeno Kovah
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation...
Keywords: Intel; x86; Intel x86; IA32; training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; disassembly; reverse engineering; OpenSecurityTraining.info
Downloads: 3,335
[movies]Day 2 Part 5: Introduction to ARM - Gananand Kini
Class materials at http://www.OpenSecurityTraining.info/IntroARM.html Follow us on Twitter for class news @OpenSecTraining. ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand, optimiz...
Keywords: OpenSecurityTraining.info; ARM; Acorn RISC Machine; Advanced RISC Machine; assembly; disassembly; reverse engineering; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 743
[movies]Day 2 Part 1: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,220
[movies]Day 1 Part 3: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,412
[movies]Day 2 Part 2: Introduction to Reverse Engineering Software - Matt Briggs
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to unde...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; IDA; IDA Pro; Debugging; Intel x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 1,426
[movies]Day 2 Part 1: Introduction to Reverse Engineering Software - Matt Briggs
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to unde...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; IDA; IDA Pro; Debugging; Intel x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 1,658
[movies]Intro ARM Class Labs Linux VM - Gananand Kini & Jeff Tam
This is the Ubuntu Linux VM that can be used for doing labs associated with the class here:http://archive.org/details/Day1Part1IntroductionToArmhttp://opensecuritytraining.info/IntroARM.html
Keywords: OpenSecurityTraining.info; ARM; Acorn RISC Machine; Advanced RISC Machine; assembly; disassembly; reverse engineering; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 291
[movies]Day 2 Part 3: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,263
[movies]Day 1 Part 2: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,540
[movies]Day 2 Part 4: Introduction to ARM - Gananand Kini
Class materials at http://www.OpenSecurityTraining.info/IntroARM.html Follow us on Twitter for class news @OpenSecTraining. ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand, optimiz...
Keywords: OpenSecurityTraining.info; ARM; Acorn RISC Machine; Advanced RISC Machine; assembly; disassembly; reverse engineering; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 721
[movies]Introductory Intel x86: Architecture, Assembly, Applications, Day 2, Part 4 - Xeno Kovah
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation...
Keywords: Intel; x86; Intel x86; IA32; training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; disassembly; reverse engineering; OpenSecurityTraining.info
Downloads: 3,187
[movies]Day 2 Part 2: Introduction to ARM - Gananand Kini
Class materials at http://www.OpenSecurityTraining.info/IntroARM.html Follow us on Twitter for class news @OpenSecTraining. ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand, optimiz...
Keywords: OpenSecurityTraining.info; ARM; Acorn RISC Machine; Advanced RISC Machine; assembly; disassembly; reverse engineering; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 745
[movies]Introductory Intel x86: Architecture, Assembly, Applications, Day 2, Part 1 - Xeno Kovah
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation...
Keywords: Intel; x86; Intel x86; IA32; training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; disassembly; reverse engineering; OpenSecurityTraining.info
Downloads: 3,839
[movies]Introductory Intel x86: Architecture, Assembly, Applications, Day 1, Part 2 - Xeno Kovah
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation...
Keywords: Intel; x86; Intel x86; IA32; training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; disassembly; reverse engineering; OpenSecurityTraining.info
Downloads: 5,890
[movies]Introductory Intel x86: Architecture, Assembly, Applications, Day 1, Part 4 - Xeno Kovah
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation...
Keywords: Intel; x86; Intel x86; IA32; training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; disassembly; reverse engineering; OpenSecurityTraining.info
Downloads: 4,241
[movies]Day 1 Part 3: Introduction to ARM - Gananand Kini
Class materials at http://www.OpenSecurityTraining.info/IntroARM.html Follow us on Twitter for class news @OpenSecTraining. ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand, optimiz...
Keywords: OpenSecurityTraining.info; ARM; Acorn RISC Machine; Advanced RISC Machine; assembly; disassembly; reverse engineering; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 830
[movies]Day 1 Part 1: Introduction to ARM - Gananand Kini
Class materials at http://www.OpenSecurityTraining.info/IntroARM.html Follow us on Twitter for class news @OpenSecTraining. ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand, optimiz...
Keywords: OpenSecurityTraining.info; ARM; Acorn RISC Machine; Advanced RISC Machine; assembly; disassembly; reverse engineering; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 2,046
[movies]Day 2 Part 3: Introduction to Reverse Engineering Software - Matt Briggs
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to unde...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; IDA; IDA Pro; Debugging; Intel x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 1,430
[movies]Day 2 Part 5: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computers Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,302
[movies]Introductory Intel x86: Architecture, Assembly, Applications, Day 2, Part 5 - Xeno Kovah
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation...
Keywords: Intel; x86; Intel x86; IA32; training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; disassembly; reverse engineering; OpenSecurityTraining.info
Downloads: 3,215
[movies]Introductory Intel x86: Architecture, Assembly, Applications, Day 1, Part 5 - Xeno Kovah
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation...
Keywords: Intel; x86; Intel x86; IA32; training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; disassembly; reverse engineering; OpenSecurityTraining.info
Downloads: 3,845
[movies]Introductory Intel x86: Architecture, Assembly, Applications, Day 2, Part 2 - Xeno Kovah
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation...
Keywords: Intel; x86; Intel x86; IA32; training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; disassembly; reverse engineering; OpenSecurityTraining.info
Downloads: 3,668
[movies]Introductory Intel x86: Architecture, Assembly, Applications, Day 1, Part 3 - Xeno Kovah
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation...
Keywords: Intel; x86; Intel x86; IA32; training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; disassembly; reverse engineering; OpenSecurityTraining.info
Downloads: 4,791
[movies]Day 3 Part 2: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 719
[movies]Day 2 Part 3: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 845
[movies]Day 3 Part 1: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 721
[movies]Day 2 Part 7 Reverse Engineering Malware - Shellcode Analysis - Frank Poz
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.htmlFollow us on Twitter for class news @OpenSecTraining.An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist.As we store more of our confidential information on our computers, from...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; Malware; Malware Analysis; Static Analysis; IDA; IDA Pro; Debugging; Intel; x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 570
[movies]Day 2 Part 1: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 910
[movies]Day 1 Part 2 Reverse Engineering Malware - Analysis Goals - Frank Poz
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.htmlFollow us on Twitter for class news @OpenSecTraining.An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist.As we store more of our confidential information on our computers, from...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; Malware; Malware Analysis; Static Analysis; IDA; IDA Pro; Debugging; Intel; x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 805
[1] 2 3 4     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related mediatypes

movies